Search Results - (( iot implementation encryption algorithm ) OR ( java data visualization algorithm ))
Search alternatives:
- implementation encryption »
- iot implementation »
- data visualization »
- java »
-
1
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
Published 2020“…Rabin-p encryptionhas yet been tested on any IoT platform. The study tries to analyze the Rabin-p behavior instead of the algorithm optimization itself on the IoT platform. …”
Get full text
Get full text
Get full text
Article -
3
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
4
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Understanding and comparing algorithms implemented in IoT devices, regarding performance discussed in this paper. …”
Get full text
Get full text
Article -
5
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
6
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
7
-
8
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
Get full text
Get full text
Article -
9
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The unauthorized modification of confidential data is one the main threats and is commonly addressed by cryptographic mechanisms, through encryption. However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
10
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data
Published 2023Conference Paper -
12
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
15
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Thesis -
16
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
17
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
18
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer A will be sent the data to computer B through the internet/LAN using JAVA program. …”
Get full text
Get full text
Monograph -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
